2Attribute Based Encryption With Privacy Preserving in Clouds

Embed Size (px)

Citation preview

  • 8/12/2019 2Attribute Based Encryption With Privacy Preserving in Clouds

    1/6

    International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169Volume: 2 Issue: 2 231 236 ______________________________________________________________________________________

    231

    _______________________________________________________________________________________

    Attribute Based Encryption with Privacy Preserving In Clouds

    M. Suriyapriya 1, A. Joicy 2

    PG Scholar 1Assistant Professor CSE Department 2

    St.Joseph College of EngineeringSriperumbudur, Chennai-602105

    [email protected], [email protected]

    Abstract Security and privacy are very important issues in cloud computing. In existing system access control in clouds are centralize d innature. The scheme uses a symmetric key approach and does not support authentication. Symmetric key algorithm uses same key for bothencryption and decryption. The authors take a centralized approach where a single key distribution center (KDC) distributes secret keys andattributes to all users. A new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. Thevalidity of the user who stores the data is also verified. The proposed scheme is resilient to replay attacks. In this scheme using Secure Hashalgorithm for authentication purpose, SHA is the one of several cryptographic hash functions, most often used to verify that a file has beenunaltered. The Paillier crypto system, is a probabilistic asymmetric algorithm for public key cryptography. Pailier algorithm use for Creation ofaccess policy, file accessing and file restoring process.

    Keywords Access control, Authentication, Secure hash algorithm, pailler algorithm. __________________________________________________*****_________________________________________________

    I. INTRODUCTION

    The mainstay of this is to propose a new decentralizedaccess control scheme for secure data storage in clouds that

    supports anonymous authentication. The proposed schemeis resilient to replay attacks. A writer whose attributes andkeys have been revoked cannot write back staleinformation. Distributed access control of data stored incloud so that only authorized users with valid attributes canaccess them. Authentication of users who store and modifytheir data on the cloud. The identity of the user is protectedfrom the cloud during authentication. The architecture isdecentralized, meaning that there can be several KDCs forkey management. The access control and authentication are

    both collusion resistant, meaning that no two users cancollude and access data or authenticate themselves, if theyare individually not authorized. Revoked users cannotaccess data after they have been revoked. The proposedscheme is resilient to replay attacks. A writer whoseattributes and keys have been revoked cannot write backstale information. The protocol supports multiple read andwrites on the data stored in the cloud. The costs arecomparable to the existing centralized approaches, and theexpensive operations are mostly done by the cloud.Proposing privacy preserving authenticated access controlscheme. According to our scheme a user can create a fileand store it securely in the cloud. This scheme consists ofuse of the two protocols ABE and ABS. The cloud verifiesthe authenticity of the user without knowing the users

    identity before storing data. The scheme also has the addedfeature of access control in which only valid users are ableto decrypt the stored information. The scheme preventsreplay attacks and supports creation, modification, and

    reading data stored in the cloud .II. RELATED WORK

    ABE was proposed by Sahai and Waters [26]. In ABE,a user has a set of attributes in addition to its unique ID.There are two classes of ABEs. In Key-policy ABE or KP-ABE (Goyal et al. [27]), the sender has an access policy toencrypt data. A writer whose attributes and keys have beenrevoked cannot write back stale information. The receiverreceives attributes and secret keys from the attributeauthority and is able to decrypt information if it has

    matching attributes. In Cipher text-policy, CP-ABE ([28],[29]), the receiver has the access policy in the form of atree, with attributes as leaves and monotonic accessstructure with AND, OR and other threshold gates.

    All the approaches take a centralized approach andallow only one KDC, which is a single point of failure.Chase [30] proposed a multi-authority ABE, in which thereare several KDC authorities (coordinated by a trustedauthority) which distribute attributes and secret keys tousers. Multi-authority ABE protocol was studied in [31],[32], which required no trusted authority which requiresevery user to have attributes from at all the KDCs.Recently, Lewko and Waters [35] proposed a fully

    mailto:[email protected]:[email protected]
  • 8/12/2019 2Attribute Based Encryption With Privacy Preserving in Clouds

    2/6

    International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169Volume: 2 Issue: 2 231 236 ______________________________________________________________________________________

    232

    _______________________________________________________________________________________

    decentralized ABE where users could have zero or moreattributes from each authority and did not require a trustedserver. In all these cases, decryption at users end iscomputation intensive. So, this technique might beinefficient when users access using their mobile devices.To get over this problem, Green et al. [33] proposed tooutsource the decryption task to a proxy server, so that theuser can compute with minimum resources (for example,hand held devices). However, the presence of one proxyand one key distribution center makes it less robust thandecentralized approaches. Both these approaches had noway to authenticate users, anonymously. Yang et al. [34]

    presented a modification of [33], authenticate users, whowant to remain anonymous while accessing the cloud.

    To ensure anonymous user authentication AttributeBased Signatures were introduced by Maji et al. [23]. Thiswas also a centralized approach. A recent scheme by thesame authors [24] takes a decentralized approach and

    provides authentication without disclosing the identity ofthe users. However, as mentioned earlier in the previoussection it is prone to replay attack.

    III. PROPOSED WORK

    The main contributions of this paper are the following:Distributed access control of data stored in cloud so thatonly authorized users with valid attributes can accessthem.The identity of the user is protected from the cloudduring authentication.The architecture is decentralized, meaning that there can

    be several KDCs for key management.The access control and authentication are both collusionresistant, meaning that no two users can collude andaccess data or authenticate themselves, if they areindividually not authorized.Revoked users cannot access data after they have beenrevoked.The proposed scheme is resilient to replay attacks. Awriter whose attributes and keys have been revokedcannot write back stale information.The protocol supports multiple read and write on thedata stored in the cloud.The costs are comparable to the existing centralizedapproaches, and the expensive operations are mostlydone by the cloud .

    Fig 1: Secure Cloud storage model

    Authentication of users who store and modify their dataon the cloud.The identity of the user is protected from the cloud

    during authentication.

    The architecture is decentralized, meaning that therecan be seve ral KDCs for key management. There are threeusers, a creator, a reader and writer. Creator Alice receives

    a token from the trustee, who is assumed to be honest. Atrustee can be someone like the federal government who

    manages social insurance numbers etc. On presenting herid the trustee gives her a token .. For example, these can

    be servers in different parts of the world. A creator on presenting the token to one or more KDCs receives keysfor encryption/decryption and signing. In the Fig. 1, SKsare secret keys given for decryption, Kx are keys forsigning. The message MSG is encrypted under the access

    policy X. The access policy decides who can access the

    data stored in the cloud. The creator decides on a claim policy Y, to prove her authenticity and signs the message

  • 8/12/2019 2Attribute Based Encryption With Privacy Preserving in Clouds

    3/6

    International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169Volume: 2 Issue: 2 231 236 ______________________________________________________________________________________

    233

    _______________________________________________________________________________________

    under this claim. The ciphertext C with signature is c, andis sent to the cloud. The cloud verifies the signature andstores the ciphertext C. When a reader wants to read, thecloud sends C. If the user has attributes matching withaccess policy, it can decrypt and get back originalmessage. Write proceeds in the same way as file creation.By designating the verification process to the cloud, itrelieves the individual users from time consumingverifications. When a reader wants to read some data storedin the cloud, it tries to decrypt it using the secret keys itreceives from the KDCs. If it has enough attributesmatching with the access policy, then it decrypts theinformation stored in the cloud.

    A. Creation of KDC

    Different number of KDC's are created and to register a

    user details. KDC name, KDC id and KDC password aregiven as input to create KDC. Inputs will save in a databaseand to register a user details given a input as username anduser id.

    Fig 2: Creation of KDC

    B. KDC Authentication

    After KDC given a user id to a user, the user willenrolled the personal details to KDC's given a input as username, user id, password etc. The KDC will be verify theuser details and it will insert it in a Database.

    \

    Fig 3: KDC Authentication

    C. Trustee and User Accessibility

    Users can get the token from trustee for the file upload.After trustee was issuing a token, trustee can view the logs.User can login with their credentials and request the tokenfrom trustee for the file upload using the user id. After theuser id received by the trustee, trustee will be create tokenusing user id, key and user signature (SHA).

    Fig 4: User Accessibility

    D. Creation of access policy

    After the key was received by the User, the messageMSG is encrypted under the access policies. The access

    policies decide who can access the data stored in the cloud.The cipher text C with signature is c, and is sent to thecloud. The cloud verifies the signature and stores the ciphertext C. When a reader wants to read, the cloud sends C. Ifthe user has attributes matching with access policy, it candecrypt and get back original message and user can uploadthe file after user get key from the KDC.

    Fig 5: Creation of access policy

    E. File accessing

    Using their access policies the users can download theirfiles by the help of kdcs to issue the private keys for the

    particular users. After trustee token issuance for the users,the users produce the token to the KDC then the tokenverify by the KDC if it is valid then KDC will provide the

    public and Private key to the user. After users received the

    c c

  • 8/12/2019 2Attribute Based Encryption With Privacy Preserving in Clouds

    4/6

    International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169Volume: 2 Issue: 2 231 236 ______________________________________________________________________________________

    234

    _______________________________________________________________________________________

    keys the files are encrypt with the public keys and set theirAccess policies (privileges).

    Fig 6: File accessing

    F. File Restoration

    Files stored in cloud can be corrupted. So for this issue,using the file recovery technique to recover the corruptedfile successfully and to hide the access policy and the userattributes.

    Fig 7: File Restoration

    G. Secure Hash Algorithm

    Definition: SHA-1 is one of several cryptographic hashfunctions, most often used to verify that a file has beenunaltered. SHA is short for Secure Hash Algorithm.

    File verification using SHA-1 is accomplished bycomparing the checksums created after running thealgorithm on the two files you want to compare. SHA-1 isthe second iteration of this cryptographic hash function,replacing the previous SHA-0. An SHA-2 cryptographichash function is also available and SHA-3 is being

    developed.

    One iteration within the SHA-1 compression function.A, B, C, D and E are 32bit words of the state. F is anonlinear function that varies. n denotes a left bitrotation by n places. n varies for each operation. W t is theexpanded message word of round t. K t is the roundconstant of round t. denotes addition modulo 2 32.

    Fig 8: Secure Hash Algorithm

    H. Paillier Algorithm

    The Paillier cryptosystem, named after and invented byPascal Paillier is a probabilistic asymmetric algorithm for

    public key cryptography.

    Key generation

    Choose two large prime number p and q randomly andindependently of each other such that gcd (pq,(p-1)(q-

    1))=1. This property is assured if both primes are ofequivalent length, i.e p,q {0,1 } s-1 for security parameter S. Compute n=pq and =lcm(p-1,q-1).

    Select random integer g where gZ* n2. Ensure n divides

    the order of g by checking the existence of thefollowing modular multiplicative inverse . = (L(g modn2))-1mod n, where function L is defind as The public(encryption) key is (n,g).. The private (decryption) keyis ( , ).

  • 8/12/2019 2Attribute Based Encryption With Privacy Preserving in Clouds

    5/6

    International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169Volume: 2 Issue: 2 231 236 ______________________________________________________________________________________

    235

    _______________________________________________________________________________________

    Encryption

    Let m be a message to be encrypted where m Z n. Selectrandom r where r Z* n. Compute cipher text as: c= g

    m .r n mod n 2

    Decryption

    Cipher text: cZ* n2.Compute message: m =L(c mod n 2).

    mod n

    IV. CONCULSION

    A decentralized access control technique withanonymous authentication, which provides user revocationand prevents replay attacks, is achieved. The cloud doesnot know the identity of the user who stores information,

    but only verifies the users credentials. Key distribution isdone in a decentralized way and also hide the attributes andaccess policy of a user. One limitation is that the cloudknows the access policy for each record stored in the cloud.In future, using SQL queries for hide the attributes andaccess policy of a user. Files stored in cloud can becorrupted. So for this issue using the file recoverytechnique to recover the corrupted file successfully and tohide the access policy and the user attributes.

    V. REFERENCES

    [1] S. Ruj, M. Stojmenovic and A. Nayak, PrivacyPreserving Access Control with Authentication forSecuring Data in Clouds, IEEE/ACM InternationalSymposium on Cluster, Cloud and Grid Computing ,

    pp. 556 563, 2012.[2] C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou,

    Toward Secure and Dependable Storage Services inCloud Computing, IEEE T. Services Computing , vol.5, no. 2, pp. 220 232, 2012.

    [3] J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W.Lou, Fuzzy keyword search over encrypted data incloud computing, in IEEE INFOCOM . , pp. 441 445,2010.

    [4] S. Kamara and K. Lauter, Cryptographic cloudstorage, in Financial Cryptography Workshops , ser.Lecture Notes in Computer Science, vol. 6054.Springer, pp. 136 149, 2010.

    [5] H. Li, Y. Dai, L. Tian, and H. Yang, Identity -basedauthentication for cloud computing, in CloudCom ,ser. Lecture Notes in Computer Science, vol. 5931.Springer, pp. 157 166, 2009.

    [6] C. Gentry, A fully homomorphic encryption scheme,Ph.D. dissertation, Stanford University, 2009,http://www.crypto.stanford.edu/craig.

    [7] A.-R. Sadeghi, T. Schneider, and M. Winandy,Token - based cloud computing, in TRUST , ser.Lecture Notes in Computer Science, vol. 6101.Springer, pp. 417 429, 2010.

    [8] R. K. L. Ko, P. Jagadpramana, M. Mowbray, S.

    Pearson, M. Kirchberg, Q. Liang, and B. S. Lee,Trust cloud: A framework for accountability and trustin cloud computing, HP Technical Report HPL -2011-38. Available athttp://www.hpl.hp.com/techreports/2011/HPL-2011-38.html.

    [9] R. Lu, X. Lin, X. Liang, and X. Shen, SecureProvenance: The Essential of Bread and Butter of DataForensics in Cloud Computing, in ACM ASIACCS ,

    pp. 282 292, 2010.

    [10] D. F. Ferraiolo and D. R. Kuhn, Role -based access

    controls, in 15th National Computer SecurityConference , 1992.

    [11] D. R. Kuhn, E. J. Coyne, and T. R. Weil, Addingattributes to role- based access control, IEEEComputer , vol. 43, no. 6, pp. 79 81, 2010.

    [12] M. Li, S. Yu, K. Ren, and W. Lou, Securing personalhealth records in cloud computing: Patient-centric andfine-grained data access control in multiownersettings, in SecureComm , pp. 89 106, 2010.

    [13] S. Yu, C. Wang, K. Ren, and W. Lou, Attribute baseddata sharing with attribute revocation, in ACM

    ASIACCS , pp. 261 270, 2010.[14] G. Wang, Q. Liu, and J. Wu, Hierarchical attribute -

    based encryption for fine-grained access control incloud storage services, in ACM CCS , , pp. 735 737,2010.

    [15] F. Zhao, T. Nishide, and K. Sakurai, Realizing fine-grained and flexible access control to outsourced datawith attribute- based cryptosystems, in ISPEC , ser.Lecture Notes in Computer Science, vol. 6672.Springer, pp. 83 97, 2011.

    [16] S. Ruj, A. Nayak, and I. Stojmenovic, DACC:

    Distributed access control in clouds, in IEEETrustCom , 2011.

    [17] http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cs-01-en.pdf.

    [18] http://securesoftwaredev.com/2012/08/20/xacml-in-the-cloud.

    [19] S. Jahid, P. Mittal, and N. Borisov, EASiER:Encryption-based access control in social networkswith effi cient revocation, in ACM ASIACCS , 2011.

    [20] R. L. Rivest, A. Shamir, and Y. Tauman, How to leaka secret, in ASIACRYPT , ser. Lecture Notes in

    Computer Science, vol. 2248. Springer, pp. 552 565,2001.

  • 8/12/2019 2Attribute Based Encryption With Privacy Preserving in Clouds

    6/6

    International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169Volume: 2 Issue: 2 231 236 ______________________________________________________________________________________

    236

    _______________________________________________________________________________________

    [21] X. Boyen, Mesh signatures, in EUROCRYPT , ser.Lecture Notes in Computer Science, vol. 4515.Springer, pp. 210 227, 2007.

    [22] D. Chaum and E. van Heyst, Group signatures, in EUROCRYPT , pp. 257 265, 1991.

    [23] H. K. Maji, M. Prabhakaran, and M. Rosulek,Attribute -based signatures: Achieving attribute-

    privacy and collusion- resistance, IACR CryptologyePrint Archive , 2008.

    [24] Attribute - based signatures, in CT-RSA , ser. Lecture Notes in Computer Science, vol. 6558. Springer, pp.376 392, 2011.

    [25] A. Beimel, Secure Schemes for Secret Sharing andKey Distribution, Ph D Thesis. Technion, Haifa,1996.

    [26] A. Sahai and B. Waters, Fuzzy identity -based

    encryption, in EUROCRYPT , ser. Lecture Notes inComputer Science, vol. 3494. Springer, pp. 457 473,2005.

    [27] V. Goyal, O. Pandey, A. Sahai, and B. Waters,Attribute -based encryption for fine-grained accesscont rol of encrypted data, in ACM Conference onComputer and Communications Security , pp. 89 98,2006.

    [28] J. Bethencourt, A. Sahai, and B. Waters, Ciphertext - policy attribute- based encryption, in IEEESymposium on Security and Privacy . , pp. 321 334,

    2007.[29] X. Liang, Z. Cao, H. Lin and D. Xing, Provably

    Secure and Efficient Bounded Ciphertext PolicyAttribute Based Encryption, in ACM ASIACCS , pp343 352, 2009.

    [30] M. Chase, Multi -authority attribute basedencryption, in TCC , ser. Lecture Notes in ComputerScience, vol. 4392. Springer, pp. 515 534, 2007.

    [31] H. Lin, Z. Cao, X. Liang and J. Shao, SecureThreshold Multi-authority Attribute Based Encryptionwithout a Central Authority, in INDOCRYPT , ser.

    Lecture Notes in Computer Science, vol. 5365,Springer, pp. 426 436, 2008.

    [32] M. Chase and S. S. M. Chow, Improving privacy andsecurity in multiauthority attribute- based encryption,in ACM Conference on Computer andCommunications Security , pp. 121 130, 2009.

    [33] Matthew Green, Susan Hohenberger and Brent Waters,Outsourcing the Decryption of ABE Ciphertexts, inUSENIX Security Symposium, 2011.

    [34] Kan Yang, Xiaohua Jia and Kui Ren, DAC -MACS:Effective Data Access Control for Multi-AuthorityCloud Storage Systems, IACR Cryptology ePrintArchive, 419, 2012.

    [35] A. B. Lewko and B . Waters, Decentralizing attribute - based encryption, in EUROCRYPT , ser. Lecture Notes in Computer